Holistic estimation of security, privacy and trust in mobile Ad Hoc networks

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)

    Abstract

    A holistic and semi-automatic framework for estimation of the overall security, privacy and trust (SPT) level could be used to answering to the challenges of the usage of mobile ad hoc networks in the Ubiquitous Computing Age. We propose our ideas for composing this framework, structured according to currently known security, privacy and trust challenges. We propose a measurement architecture is to monitor the SPT performance of mobile ad hoc networks at the node, network segment and entire network levels. (17 refs.)
    Original languageEnglish
    Title of host publicationProceedings
    Subtitle of host publication3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2008
    Place of PublicationPiscataway, NJ, USA
    PublisherIEEE Institute of Electrical and Electronic Engineers
    Pages2183-2188
    ISBN (Print)978-1-4244-1751-3, 978-1-4244-1752-0
    DOIs
    Publication statusPublished - 2008
    MoE publication typeA4 Article in a conference publication
    Event3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2008 - Damascus, Syrian Arab Republic
    Duration: 7 Apr 200811 Apr 2008

    Conference

    Conference3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2008
    Abbreviated titleICTTA 2008
    CountrySyrian Arab Republic
    CityDamascus
    Period7/04/0811/04/08

    Keywords

    • Mobile ad hoc networks
    • Security
    • Security estimation

    Fingerprint Dive into the research topics of 'Holistic estimation of security, privacy and trust in mobile Ad Hoc networks'. Together they form a unique fingerprint.

  • Cite this

    Savola, R. (2008). Holistic estimation of security, privacy and trust in mobile Ad Hoc networks. In Proceedings: 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2008 (pp. 2183-2188). IEEE Institute of Electrical and Electronic Engineers. https://doi.org/10.1109/ICTTA.2008.4530183